메뉴 건너뛰기




Volumn 2890, Issue , 2003, Pages 91-102

On the possibility of provably secure obfuscating programs

Author keywords

Hard core predicate; Mutual information; Obfuscation; One way function; Program transformation; Security

Indexed keywords

INFORMATION THEORY; SEMANTICS;

EID: 33244496918     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: None     Document Type: Article
Times cited : (19)

References (19)
  • 3
    • 84947229190 scopus 로고    scopus 로고
    • An approach to the obfuscation of control flow of sequential computer programs
    • Information Security Conference
    • Chow S., Gu Y., Johnson H., Zakharov V., An approach to the obfuscation of control flow of sequential computer programs. Information Security Conference, Lecture Notes in Computer Science, 2200, 2001, p. 144-156.
    • (2001) Lecture Notes in Computer Science , vol.2200 , pp. 144-156
    • Chow, S.1    Gu, Y.2    Johnson, H.3    Zakharov, V.4
  • 7
    • 0036704573 scopus 로고    scopus 로고
    • Watermarking, tamper-proofing and obfuscation - Tools for software protection
    • Collberg C., Thomborson C., Watermarking, tamper-proofing and obfuscation - tools for software protection. IEEE Transactions on Software Engineering, 28, N 2, 2002, p. 735-746.
    • (2002) IEEE Transactions on Software Engineering , vol.28 , Issue.2 , pp. 735-746
    • Collberg, C.1    Thomborson, C.2
  • 8
    • 84970947585 scopus 로고    scopus 로고
    • Software engineering for security: A roadmap
    • Devanbu P.T., Stubblebine S. Software engineering for security: a roadmap. Future of SE Track, 2000, 227-239.
    • (2000) Future of SE Track , pp. 227-239
    • Devanbu, P.T.1    Stubblebine, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.